Insecure Default Settings

Severity: Medium

Workday comes with default settings that may not be suitable for securing sensitive data, and if not addressed, they can expose organizations to security risks. Default settings may not reflect the organization's security requirements, leaving them open to vulnerabilities that could lead to data breaches, unauthorized access, or other security incidents.

To mitigate this risk, organizations should review and update default settings, such as password policies, session timeout values, and IP restrictions. This involves reviewing Workday's default security settings and assessing their appropriateness for the organization's security requirements. Changes can be made to default settings to align them with the organization's security policies and procedures.

Enabling security features like multi-factor authentication (MFA), login alerts, and login history tracking is also critical to securing sensitive data. MFA adds an additional layer of security to user authentication, making it more difficult for unauthorized users to access sensitive data. Login alerts and history tracking provide visibility into who is accessing the system and when, helping to identify potential security incidents.

Following Workday security best practices is also essential to ensuring a secure platform configuration. These best practices include regular security assessments, vulnerability testing, and security training for users. Workday's security best practices should be incorporated into the organization's security policies and procedures to ensure that they are followed consistently.

To mitigate the risk of default settings exposing organizations to security risks, organizations should review and update default settings, enable security features like MFA, login alerts, and login history tracking, and follow Workday security best practices to ensure a secure platform configuration. By following these best practices, organizations can significantly reduce the risks associated with default settings that may not be suitable for securing sensitive data.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.